An abandoned Indalex plant still contained personnel records. Employee names, Social Security numbers, medical records, addresses, and other sensitive information were exposed when scavengers looking for aluminum and other materials ravaged the abandoned plant. The plant was closed in 2008 and Indalex filed for bankruptcy in 2009. Indalex received clearance from a bankruptcy court to officially abandon the plant in 2010. The damage was discovered when 40 workers from the Stanislaus County jail alternative work program cleared the plant.

A phishing attack exposed the personal information of users with domain names. The unauthorized access was discovered by 101domain.com when a vendor contacted them to inform them of a breach that affected multiple vendors, including 101Domain.com.

Detailed medical information was discovered on the back of a drawing from a student of Hale Elementary. An attorney from Sawicki and Phelps donated the firm's old paper to her child's school. A local news team contacted the school after discovering the incident and additional pieces of paper were collected and stored in a secure location. The number of people affected was not revealed.

The names, email addresses, and affiliations of certain people who registered with PRESENT e-Learning Systems' Podiatry program were posted online at Pastebin.com. An additional 86 people had their names and mailing addresses posted on Pastie.org after registering for a podiatry online tutoring course. A hacker called "Teku" claimed responsibility.

A Baltimore law firm called Baxter, Baker, Sidle, Conn and Jones lost a hard drive with patient records. It contained patient names, Social Security numbers, medical records, addresses, dates of birth, and insurance information. The law firm was using the medical records of patients who were suing a cardiologist at St. Joseph Medical Center. The hard drive was lost by an employee during travel on August 4. Patients were informed in early October.

A local news team was alerted to a group of scattered documents near a lake and an interstate. Most of the documents were labeled with an "Eaton Group" stamp. The owner of the law group and collection service was not sure how the documents came to be exposed rather than properly disposed of. The court case documents exposed names, Social Security numbers, addresses, bank statements, bank account numbers, Mastercard account numbers, and other sensitive information.

VeriSign was hacked repeatedly in 2010. The hackers stole undisclosed information. VeriSign is responsible for the integrity of web addresses ending in.com, .net, and .gov. If hackers were able to obtain certain information, it is possible that .com, .net, and .gov websites could be imitated more easily. Hackers may be able to direct people to faked website and intercept email from federal employees or corporate executives using the .gov addresses.